Implementation Roadmap

Learn the process you need to follow to learn how eramba is used and implementated

  • Episodes10
  • Duration18m 14s
  • LanguagesEN
Episode 3

Use Cases

Detailed explanation of the different use cases and their checklist

Introduction

The first phase in the implementation roadmap is to define what use cases you will implement in eramba.

Phase Instructions:

  • Choose one (yes, one) use case from the list below. Do not attempt to implement more than one use case at a time.
  • Click on the left panel the use case you chose, and identify what modules you will need to implement for that use case. This diagram will be needed across all other implementation phases.

The second step is to use this guide to identify what modules you will need for every use case, on the left of this episode click on the use case, and a diagram will clearly show what modules you need. 

Compliance Management

The Compliance Use Case scenario module requires the following modules:

  • Compliance Management / Compliance Packages
  • Compliance Management / Compliance Analysis
  • Compliance Management / Compliance Exceptions
  • Compliance Management / Compliance Analysis Findings
  • Controls Catalogue / Internal Controls
  • Controls Catalogue / Security Policies
  • Security Operations / Project Management

The diagram below shows how these basic relations interact one with another.

Risk Management

The Risk Management use case requires the following modules:

  • Organization / Business Units
  • Organization / Business Units / Process
  • Organization / Third Parties
  • Organization / Liabilities
  • Asset Management / Assets
  • Risk Management / Asset Risk Management
  • Risk Management / Third Party Risk Management
  • Risk Management / Business Impact Analysis
  • Risk Management / Risk Exceptions
  • Controls Catalogue / Internal Controls
  • Controls Catalogue / Security Policies
  • Security Operations / Project Management

The diagram below shows how these basic relations interact one with another.

Data Privacy

The Data Privacy use case requires the following modules:

  • Organization / Business Units
  • Organization / Third Parties
  • Organization / Liabilities
  • Asset Management / Assets
  • Asset Management / Data Flows
  • Risk Management / Asset Risk Management
  • Risk Management / Third Party Risk Management
  • Risk Management / Business Impact Analysis
  • Controls Catalogue / Internal Controls
  • Controls Catalogue / Security Policies
  • Security Operations / Project Management

The diagram below shows how these basic relations interact one with another.

Incident Management

The Incident Management use case requires the following modules:

  • Security Operations / Incident Management

Optionally:

  • Asset Management / Assets
  • Controls Catalogue / Internal Controls
  • Controls Catalogue / Security Policies
  • Risk Management / Asset Risk Management
  • Risk Management / Third Party Risk Management
  • Risk Management / Business Impact Analysis

The diagram below shows how these basic relations interact one with another.

Awareness Programs

The Awareness Program use case requires the following modules:

  • Security Operations / Awareness Programs

Optionally:

  • Controls Catalogue / Security Policies

Online Assessments

The Online Assessment (OA) use case requires the following modules:

  • Compliance Management / Online Assessments

Optionally:

  • Organisation / Third Parties
  • Risk Management / Asset Risk Management
  • Risk Management / Third Party Risk Management
  • Risk Management / Business Impact Analysis
  • Asset Management / Data Privacy

The diagram below shows how these basic relations interact one with another.